General

  • Target

    Game Space Pro_v2.1.0_.apk

  • Size

    5.1MB

  • Sample

    240617-mbf6fawenb

  • MD5

    d8000fe9472c32299cd1df3d919f5483

  • SHA1

    b16c7f21d9a626cf7f56d1df9bfb649e95bf1545

  • SHA256

    891f8bab623a9852c9509d583498dd536cfe1082ae414bb0d219c02153271865

  • SHA512

    502fd505a7345cd6d92bed94b188a6e91e654732a8bdcb0fa3d85db83d693badb4a8342fc4b589132292c1dbc99e910043ed023bc8e1398e96424150da6b94ab

  • SSDEEP

    98304:pYJ2F7qo6tiMrTq4mYB8nCnDT0XrIZfUeP5Fej8VBmXDuoPTXwyE:pYJUQ4t4HBvnDQkfUOFODu+LwyE

Malware Config

Targets

    • Target

      Game Space Pro_v2.1.0_.apk

    • Size

      5.1MB

    • MD5

      d8000fe9472c32299cd1df3d919f5483

    • SHA1

      b16c7f21d9a626cf7f56d1df9bfb649e95bf1545

    • SHA256

      891f8bab623a9852c9509d583498dd536cfe1082ae414bb0d219c02153271865

    • SHA512

      502fd505a7345cd6d92bed94b188a6e91e654732a8bdcb0fa3d85db83d693badb4a8342fc4b589132292c1dbc99e910043ed023bc8e1398e96424150da6b94ab

    • SSDEEP

      98304:pYJ2F7qo6tiMrTq4mYB8nCnDT0XrIZfUeP5Fej8VBmXDuoPTXwyE:pYJUQ4t4HBvnDQkfUOFODu+LwyE

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks